Learn about SSH

SSH protocol (also known as Secure Shell) is a method for secure remote login, from one computer to another computer. It offers several alternative options for strong authentication, communication security protection and integrity with strong encryption features. It is a safe alternative to unprotected login protocols (such as telnet, rlogin) and unsafe file transfer methods (such as FTP).

Main content about SSH

  1. What is SSH?
  2. Typical uses of the SSH protocol
  3. How does SSH protocol work?
  4. Powerful authentication with SSH keys
  5. SSH provides strong encryption and integrity protection features

What is SSH?

SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access remote computers. SSH also refers to the suite of protocols that implement the protocol. Secure Shell provides strong authentication and communication security between two computers connected over unsecured networks such as the Internet. SSH is widely used by network administrators, to manage systems and remote applications, allow them to log on to another computer over the network, execute commands and move files from one computer to another. Other computer.

SSH can refer to both the encrypted network protocol and the utility suite that implements that protocol. SSH uses the client-server model, connects a secure client shell application, the end point at which the session is displayed, with an SSH server, the end point at which the session is active.

In addition to Microsoft Windows, SSH software is available by default on most operating systems. SSH also supports tunneling techniques, forwarding arbitrary TCP ports and connecting X11, while file transfers can be done using secure file transfer protocols or secure copy (SCP) protocols. link. By default, the SSH server listens on standard TCP port 22.

The SSH set includes three utilities: Slogin, ssh and scp. Those are safe versions of previous unsafe UNIX utilities like rlogin, rsh and rcp. SSH uses public key encryption to authenticate remote computers and allows remote computers to authenticate users, if needed.

The first SSH version appeared in 1995 and was designed by Tatu Ylönen, a researcher at Helsinki Technology University, who founded SSH Communications Security. Over time, various errors have appeared in SSH-1 and it has become obsolete. The Secure Shell protocol suite is now SSH-2 and is considered standard in 2006. It is incompatible with SSH-1 and uses Diffie-Hellman key exchange and stronger integrity checks (using verification code). real via message) to improve security. Client and SSH servers can use some encryption methods, mainly AES and Blowfish.

However, no exploit flaw was found in SSH2, although according to sources of information leaked by Edward Snowden in 2013, the National Security Agency could decrypt some SSH traffic.

Shellshock, a security hole in the Bash command processor, can be executed on SSH. In fact, the biggest threat to SSH is poor key management. If you don't selectively select, rotate, and remove SSH keys appropriately, organizations can lose control of who has access to which resources and when they can access them, especially when SSH is used in application-to-application processes (from applications to applications) automatically.

Typical uses of the SSH protocol

The protocol is used in corporate networks to:

  1. Provides secure access to users and automated processes
  2. Transfer interactive and automated files
  3. Play remote commands
  4. Network infrastructure management and system components keep other important tasks.

How does SSH protocol work?

The protocol works in the client-server model, which means that the connection is established by the SSH client connecting to the SSH server. SSH client controls the connection setup process and uses public key encryption to verify the identity of the SSH server. After the setup phase, the SSH protocol uses strong symmetric encryption algorithms and hash algorithms to ensure the privacy and integrity of the data exchanged between the client and the server.

The figure below shows a simple set of safe shell connections.

Learn about SSH Picture 1

Powerful authentication with SSH keys

There are several options that can be used to authenticate users. The most popular options are passwords and public key authentication.

The public key authentication method is used primarily for automation and sometimes by system administrators to log in once. It has been used much more widely than the public has ever predicted. The idea is to have an encryption key pair - a public key and a private key - and configure the public key on the server to allow access and authorization to anyone who has a private key copy that can be accessed. server update. The keys used for authentication are called SSH keys. Public key authentication is also used with smart cards, such as CAC and PIV cards used by the US government.

The main use of authentication keys is to enable secure automation. Secure shell file transfer is used to seamlessly integrate applications and is also used for automated systems and configuration management.

As you can see, large organizations have more SSH keys than they imagine and managing SSH keys becomes very important. SSH keys grant access the same as granting access via user name and password. They require a similar start and end process.

In some cases, we will find several million SSH keys that allow access to production servers in the client environment, with 90% of the keys actually not being used and representing access rights already licensed but never terminated. Ensuring proper policies, processes and audits to use SSH are very important for proper identity and access management. Traditional identity management projects have skipped up to 90% of all login information, by skipping SSH keys. Services and tools for implementing SSH key management are also provided.

SSH provides strong encryption and integrity protection features

When the connection is established between the client and the SSH server, the transmitted data will be encrypted according to the parameters negotiated during the setup process. During the negotiation process, the client and server agree on the symmetric encryption algorithm to be used and create the encryption key to be used. Traffic between communication parties is protected by strong encryption algorithms according to industry standards, such as AES (Advanced Encryption Standard), and the SSH protocol also includes a mechanism to ensure integrity. integrity of the data is transmitted using standard hash algorithms, such as SHA -2 (Standard Hashing Algorithm).

See more:

  1. Introducing OpenSSH
  2. VPN and SSH: Which method is more secure?
  3. Install SSH on the Router for secure web access anywhere
4 ★ | 1 Vote

May be interested

  • How to learn English via Flashcard on AnkiDroidHow to learn English via Flashcard on AnkiDroid
    ankidroid supports you to create smart cards to learn foreign languages ​​on your phone with many other interesting features.
  • How to Learn FasterHow to Learn Faster
    in order to adapt more quickly to the rapidly changing environments in which we live, we need to learn more effectively and efficiently. this article is intended to describe some basics for meta-learning, or learning about learning, to...
  • How to learn English on Chrome through the Rememberry utilityHow to learn English on Chrome through the Rememberry utility
    rememberry utility on chrome will help you learn english through the ability to translate languages, learn english words through word cards and test.
  • How to Alphabetize in Microsoft WordHow to Alphabetize in Microsoft Word
    alphabetizing lists is a good skill to learn in word, especially if you find yourself dealing with directories and lists often. luckily, the sorting process is quite simple once you learn how to access it. follow this guide to learn how...
  • To be good at English, don't forget to visit these 13 YouTube channels every dayTo be good at English, don't forget to visit these 13 YouTube channels every day
    in addition to movies, youtube is also a resource repository that any english learner cannot ignore. if you only think of funny videos, advertisements, documentaries or music videos of all genres, you have ignored the great learning materials on this planet's largest video sharing social network. there.
  • Learn the first Python programLearn the first Python program
    in this article we will learn a simple python program to get a little more insight into python, before starting to learn about the main components of this programming language.
  • The secret to help you achieve what you want without wasting timeThe secret to help you achieve what you want without wasting time
    when trying to accomplish something bigger, you can answer the question of why but don't know how (how)? you feel confused because you don't know which direction will help you achieve those goals? this is the solution!
  • How to Learn Web DesignHow to Learn Web Design
    web design is a very valuable skill, especially in today's world where everything revolves around the internet. if you're really good at it, you can make money from customers, create a membership page (a website that restricts guests' access to content), or pursue other monetization projects. and if you really want to know how to learn web design then this article is for you!
  • 5 free websites and online games to learn about the Linux command line5 free websites and online games to learn about the Linux command line
    linux is popular for its reliability and many practical applications. if you want to know more about linux, here are 5 websites that will help you learn it interactively.
  • 12 Facebook Pages useful for English learners12 Facebook Pages useful for English learners
    like and follow these english learning pages will make your facebook surfing habits extremely meaningful.